Steam telepítése
belépés
|
nyelv
简体中文 (egyszerűsített kínai)
繁體中文 (hagyományos kínai)
日本語 (japán)
한국어 (koreai)
ไทย (thai)
Български (bolgár)
Čeština (cseh)
Dansk (dán)
Deutsch (német)
English (angol)
Español - España (spanyolországi spanyol)
Español - Latinoamérica (latin-amerikai spanyol)
Ελληνικά (görög)
Français (francia)
Italiano (olasz)
Bahasa Indonesia (indonéz)
Nederlands (holland)
Norsk (norvég)
Polski (lengyel)
Português (portugáliai portugál)
Português - Brasil (brazíliai portugál)
Română (román)
Русский (orosz)
Suomi (finn)
Svenska (svéd)
Türkçe (török)
Tiếng Việt (vietnámi)
Українська (ukrán)
Fordítási probléma jelentése
If you've tried reinstalling the OS, your hardware is in need of testing. Remove pieces of it - specifically remove your data drive just in case there's anything on it you need, and copy those things off to another drive asap.
Is this a new machine? Any new parts? Have you cleaned it and made sure that the fans in it are properly working?
2. Check the Windows folder for crash dumps and upload them, should have the extension DMP.
Microsoft (R) Windows Debugger Version 10.0.17016.1000 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Windows\MEMORY.DMP]
Kernel Bitmap Dump File: Kernel address space is available, User address space may not be available.
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 15063 MP (8 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS Personal
Built by: 15063.0.amd64fre.rs2_release.170317-1834
Machine Name:
Kernel base = 0xfffff800`5560d000 PsLoadedModuleList = 0xfffff800`559595a0
Debug session time: Mon Nov 6 09:35:50.498 2017 (UTC + 2:00)
System Uptime: 0 days 0:04:21.226
Loading Kernel Symbols
...............................................................
................................................................
..................................
Loading User Symbols
PEB is paged out (Peb.Ldr = 0000002b`4793a018). Type ".hh dbgerr001" for details
Loading unloaded module list
.......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck A, {398, 2, 1, fffff800557966f4}
Probably caused by : memory_corruption ( nt!MiRestoreTransitionPte+15cfb4 )
Followup: MachineOwner
---------
nt!KeBugCheckEx:
fffff800`55778fd0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffb681`ca0c1c40=000000000000000a
Implicit thread is now ffffdb06`032587c0
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
IRQL_NOT_LESS_OR_EQUAL (a)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If a kernel debugger is available get the stack backtrace.
Arguments:
Arg1: 0000000000000398, memory referenced
Arg2: 0000000000000002, IRQL
Arg3: 0000000000000001, bitfield :
bit 0 : value 0 = read operation, 1 = write operation
bit 3 : value 0 = not an execute operation, 1 = execute operation (only on chips which support this level of status)
Arg4: fffff800557966f4, address which referenced memory
Debugging Details:
------------------
DUMP_CLASS: 1
DUMP_QUALIFIER: 401
BUILD_VERSION_STRING: 15063.0.amd64fre.rs2_release.170317-1834
SYSTEM_MANUFACTURER: System manufacturer
SYSTEM_PRODUCT_NAME: System Product Name
SYSTEM_SKU: SKU
SYSTEM_VERSION: System Version
BIOS_VENDOR: American Megatrends Inc.
BIOS_VERSION: 0809
BIOS_DATE: 07/07/2017
BASEBOARD_MANUFACTURER: ASUSTeK COMPUTER INC.
BASEBOARD_PRODUCT: PRIME Z270-K
BASEBOARD_VERSION: Rev X.0x
DUMP_TYPE: 1
BUGCHECK_P1: 398
BUGCHECK_P2: 2
BUGCHECK_P3: 1
BUGCHECK_P4: fffff800557966f4
WRITE_ADDRESS: 0000000000000398
CURRENT_IRQL: 2
FAULTING_IP:
nt!MiRestoreTransitionPte+15cfb4
fffff800`557966f4 f0480fc18298030000 lock xadd qword ptr [rdx+398h],rax
CPU_COUNT: 8
CPU_MHZ: fa8
CPU_VENDOR: GenuineIntel
CPU_FAMILY: 6
CPU_MODEL: 5e
CPU_STEPPING: 3
CPU_MICROCODE: 6,5e,3,0 (F,M,S,R) SIG: BA'00000000 (cache) BA'00000000 (init)
BLACKBOXBSD: 1 (!blackboxbsd)
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: TiWorker.exe
ANALYSIS_SESSION_HOST: DESKTOP-U0E85BH
ANALYSIS_SESSION_TIME: 11-06-2017 12:12:21.0495
ANALYSIS_VERSION: 10.0.17016.1000 amd64fre
TRAP_FRAME: ffffb681ca0c1d80 -- (.trap 0xffffb681ca0c1d80)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=ffffffffffffffff rbx=0000000000000000 rcx=aa41c62a63380000
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800557966f4 rsp=ffffb681ca0c1f10 rbp=0000000000000001
r8=0000000000000000 r9=0000000000000000 r10=00000000c000003f
r11=ffffb681ca0c1f08 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na po nc
nt!MiRestoreTransitionPte+0x15cfb4:
fffff800`557966f4 f0480fc18298030000 lock xadd qword ptr [rdx+398h],rax ds:00000000`00000398=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff800557843a9 to fffff80055778fd0
STACK_TEXT:
ffffb681`ca0c1c38 fffff800`557843a9 : 00000000`0000000a 00000000`00000398 00000000`00000002 00000000`00000001 : nt!KeBugCheckEx
ffffb681`ca0c1c40 fffff800`5578297d : 00000000`00000000 00000000`00000000 00000000`0004d290 ffffeb80`00e77b28 : nt!KiBugCheckDispatch+0x69
ffffb681`ca0c1d80 fffff800`557966f4 : 00000000`00000000 ffffdb06`047ece50 00000000`00000001 0000000f`ffffffff : nt!KiPageFault+0x23d
ffffb681`ca0c1f10 fffff800`5568d85e : 00000000`00000000 ffffeb80`00e78220 00000000`00000001 ffffeb80`00e627a0 : nt!MiRestoreTransitionPte+0x15cfb4
ffffb681`ca0c1f80 fffff800`5568e404 : 00000000`00000000 ffffdb06`064f61d0 ffffffff`ffffffff 00000000`c0000242 : nt!MiFinishHardFault+0x9ee
ffffb681`ca0c2140 fffff800`556d7b0e : ffffdb06`065487c0 00000000`00000000 ffffdb06`00000000 ffffdb06`00000000 : nt!MiWaitForInPageComplete+0x264
ffffb681`ca0c2240 fffff800`556d7a8e : 00000000`00000000 00000000`00000000 ffffdb06`ffffffff 00000000`00000000 : nt!MiPfCompleteInPageSupport+0x3a
ffffb681`ca0c2280 fffff800`556d79e9 : 00000000`003c0000 00000000`00000001 00000000`00000001 ffffdb06`050e9950 : nt!MiPfCompletePrefetchIos+0x4e
ffffb681`ca0c22b0 fffff800`55632baf : 00000000`003c0000 ffffa00d`d5640000 00000000`00040000 00000000`00040000 : nt!MmWaitForCacheManagerPrefetch+0x35
ffffb681`ca0c22e0 fffff800`55a5d449 : 00000000`00040000 00000000`00000000 00000000`00000001 ffffb681`ca0c23f0 : nt!CcFetchDataForRead+0xff
ffffb681`ca0c2340 fffff800`556328eb : ffffdb06`052baab8 00000000`00040000 ffffdb06`00040000 00000000`00000001 : nt!CcMapAndCopyFromCache+0xd9
ffffb681`ca0c23e0 fffff802`cdcb4032 : ffffc88d`00000002 00000000`00000001 ffffc88d`00400000 ffffc88d`00000000 : nt!CcCopyReadEx+0x12b
ffffb681`ca0c2470 fffff802`cdcac5e3 : ffffdb05`f8fe4180 ffffb681`ca0c2700 ffffc88d`63fae9a0 00000000`000000ff : NTFS!NtfsCachedRead+0x1a6
ffffb681`ca0c24e0 fffff802`cdcab93e : ffffdb06`05f94b88 ffffdb06`0484d010 ffffc88d`63faea30 0000021b`00000001 : NTFS!NtfsCommonRead+0xad3
ffffb681`ca0c26d0 fffff802`cd40563d : ffffdb06`061f2c00 ffffdb06`0484d010 ffffdb05`f8fe7df0 ffffdb06`0484d3f8 : NTFS!NtfsFsdRead+0x1ee
ffffb681`ca0c2780 fffff802`cd4034d6 : ffffb681`ca0c2810 00000000`00000001 00000000`00000020 0000021b`2dc04000 : FLTMGR!FltpLegacyProcessingAfterPreCallbacksCompleted+0x18d
ffffb681`ca0c27f0 fffff800`55a6a54f : ffffdb06`050e9950 ffffdb06`0484d010 ffffdb06`0484d440 ffffdb06`03141080 : FLTMGR!FltpDispatch+0xb6
ffffb681`ca0c2850 fffff800`55a69497 : ffffdb06`00000001 ffffdb06`050e9904 ffffdb06`050e99a0 ffffb681`ca0c2b00 : nt!IopSynchronousServiceTail+0x1af
ffffb681`ca0c2910 fffff800`55783f13 : fffff178`8086cb70 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtReadFile+0x697
ffffb681`ca0c2a10 00007ffa`a5745474 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
0000002b`47bfb688 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`a5745474
THREAD_SHA1_HASH_MOD_FUNC: b65e86438cbeb0ae67c7bc57d2870f0bc20f5bd3
THREAD_SHA1_HASH_MOD_FUNC_OFFSET: fbd07d6432665c42cb8136a8687b7543bd0803e1
THREAD_SHA1_HASH_MOD: 58ab11b5031933b0a9e8d411452bdae93b39e053
FOLLOWUP_IP:
nt!MiRestoreTransitionPte+15cfb4
fffff800`557966f4 f0480fc18298030000 lock xadd qword ptr [rdx+398h],rax
FAULT_INSTR_CODE: c10f48f0
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: nt!MiRestoreTransitionPte+15cfb4
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: nt
DEBUG_FLR_IMAGE_TIMESTAMP: 58ccba4c
STACK_COMMAND: .thread ; .cxr ; kb
IMAGE_NAME: memory_corruption
BUCKET_ID_FUNC_OFFSET: 15cfb4
FAILURE_BUCKET_ID: AV_nt!MiRestoreTransitionPte
BUCKET_ID: AV_nt!MiRestoreTransitionPte
PRIMARY_PROBLEM_CLASS: AV_nt!MiRestoreTransitionPte
TARGET_TIME: 2017-11-06T07:35:50.000Z
OSBUILD: 15063
OSSERVICEPACK: 0
SERVICEPACK_NUMBER: 0
OS_REVISION: 0
SUITE_MASK: 784
PRODUCT_TYPE: 1
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
OSEDITION: Windows 10 WinNt TerminalServer SingleUserTS Personal
OS_LOCALE:
USER_LCID: 0
OSBUILD_TIMESTAMP: 2017-03-18 06:40:44
BUILDDATESTAMP_STR: 170317-1834
BUILDLAB_STR: rs2_release
BUILDOSVER_STR: 10.0.15063.0.amd64fre.rs2_release.170317-1834
ANALYSIS_SESSION_ELAPSED_TIME: 3fc45
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_nt!mirestoretransitionpte
FAILURE_ID_HASH: {37d4886d-fd49-86e8-3405-f2978c32f33e}
Followup: MachineOwner
---------